🐉 neospace ~

          • Man-in-the-Middle Attack MITM
          • Monoalphabetic Substitution Cipher - A Detailed Explanation
          • XSS vs HTML
            • 🔗 Computer Architecture - CYBVU 23.2
            • Computer Organization
            • Introduction to Computer Architecture
            • 🔗 Data Communications and Networks
            • Lecture 1 - Introduction
            • Lecture 2 - Email Services
            • Lecture 3 - Data and Signals
            • Lecture 4 - Communication Medium
            • Lecture 5 - Wireless Medium
            • 🔗 Java - CYBVU 23.2
            • 22 Aug Lecture Note
            • 30th Aug Assignment Submission
            • Arithmetic Expressions
            • Data Types
            • Hello World, Escape Sequences, Comments
            • Introduction to Java
            • Java Full RECAP
            • String args
            • User input (Scanner)
            • Variables
            • 🔗 Operating Systems
            • Introduction to Operating Systems
            • Lec 2 Process Management
            • Lec 3 Process Control Management
            • Lec 4 Memory Management
            • Lec 5 Virtual Memory Management
            • 🔗 Web Application Development - CYBVU 23.2
            • All CSS Concepts at once (module related)
            • Client-Server Model
            • Essential JavaScript Concepts for This Module Pt.1
            • HTTP vs HTTPS
            • Introduction to HTML Part A
            • Introduction to HTML Part B
            • JavaScript Form Validation Pt. 3
            • JavaScript Pt. 2
            • PHP Pt. 1
            • PHP Pt. 2
            • Static vs Dynamic Pages
            • Website vs WebApp
            • What is the INTERNET?
            • World Wide Web (WWW)
          • Spring 24' Y1S2
            • 🔗 Cybersec Essentials
            • Lab 1 CSES
            • Lab 2 CSES
            • Lab 3 CSES
            • Lab 4 CSES
            • Lab 5 CSES
            • Lab 6 CSES
            • Lab 7 CSES
            • Week 1 - Introduction to Security
            • Week 2 - Malware and Social Engineering Attacks
            • Week 3 - Application and Networking-Based Attacks
            • Week 4 - Cryptography
            • Week 5 - Cryptography Part-II
            • 🔗 Server Administration and Management
            • Lab 1 SAAM
            • Lab 3 SAAM
            • Presentation Case Study
            • Week 1 Introduction to Windows Server
            • 🔗 Digital Forensics and Ethical Hacking
            • Lab 1 DFEH
            • Lab 2 DFEH
            • Lab 3 DFEH
            • Lab 4 DFEH
            • Lab 6 DFEH
            • Lab 7 DFEH
            • Lab 8 DFEH
            • Lab 9 DFEH
            • Research About Hashing
            • Week 1 - Intro to Digital Forensics and its Processes
            • Week 1 DFEH Before Class Activities
            • Week 2 - Computer Forensics
            • Week 3 - Mobile Forensics
            • Week 3 DFEH Before Class
            • Week 5 - Investigative Reports and Legal Acceptance
            • 🔗 Introduction to Ict Management
            • NIT2171 ICT Management Test 1
            • Week 1 - ICT trends and challengers
          • Winter 24' Y2S1
                • 🔗 Module 1 Foundations of Cybersecurity
                • Common CyberSec Terminology
                • Core skills for cybersec professionals
                • Course 1 Overview
                • Google Cybersecurity Certificate Overview
                • Helpful resources and tips
                • Importance of CyberSecurity
                • Introduction to Cybersecurity
                • My Path to CyberSecurity
                • Nikki A day in the life of a security engineer
                • Responsibilities of an entry-level cybersecurity analyst
                • Transferable and technical cybersecurity skills
                • Veronica My path to working in cybersecurity
                • Welcome to the Google Cybersecurity Certificate
                • Wrap-up Module 01
                • 🔗 Module 2 Foundations of Cybersecurity
                • Attacks in the digital age
                • Common attacks and their effectiveness
                • Determine the type of attack
                • Glossary terms from module 2
                • Introduction to the eight CISSP security domains Part 1
                • Introduction to the eight CISSP security domains Part 2
                • Keep Your Cool during a data breach
                • Past CyberSecurity Attacks
                • Understand attackers
                • Welcome to module 2
                • Wrap-up Module 02
              • Foundations of Cybersecurity
            • 🔗 Google Cybersecurity Professional Certificate
          • 🔗 HackTheBox CTF
          • Low Logic
          • 🔗 HTB Academy
          • Introduction to Active Directory
          • Introduction to Networking
          • Networking Overview
            • 1. Read YAML data - Python to process YAML with Codespaces
            • Career Essentials in GitHub Professional Certificate
            • Docker
            • How Actions Works
            • Python to process YAML with Codespaces
            • 🔗 Prepare for the GitHub Foundations Certification
            • Branches
            • Changing History
            • Deleting and renaming files
            • git diff
            • Git stash and clean
            • Github Options
            • Ignore Files - gitignore
            • Manage Conflicts
            • Pushing to Github
            • Setting up Git
            • Understanding Environments
            • What is Git
            • What is Github
            • What is Version Control
          • IP Addressing and Subnetting
          • More about -sV and -sC
          • More About Alternate Data Stream
          • More About JQ
          • Understanding `$0` in awk
          • Understanding 2>&1 in Unix-like Shells
            • 🔐 Ethereum Fundamentals
            • Blockchain and Hashing
            • Blockchain Benefits and Disadvantages
            • Blockchain Operations
            • Ethereum Basics
            • The New Blockchain - Blockchain 2.0
          • 🔗 PicoGym
          • Big Zip
          • Binhexa
          • Blame Game
          • Bookmarklet
          • CanYouSee
          • Collaborative Development
          • Commitment Issues
          • Cookies
          • dont-you-love-banners
          • endianness
          • First Find
          • Glory of the garden
          • Includes
          • Information
          • Inspect HTML
          • Inspector
          • interencdec
          • Local Authority
          • runme.py
          • SansAlpha
          • Scan Surprise
          • Scavenger Hunt
          • Secret of the Polyglot
          • Super SSH
          • Time Machine
          • Unminify
          • Verify
          • WebDecode
          • Where are the robots
          • Pi Metasploitable
          • Raspberry Pi Kali-Linux Headless Setup
            • Advent of Cyber 2024 ⛄️❄️
            • Day 1 Maybe SOC-mas music, he thought, doesn't come from a store?
            • Day 2 One man's false positive is another man's potpourri
            • Day 3 Even if I wanted to go, their vulnerabilities wouldn't allow it
            • Day 4 I'm all atomic inside!
            • Day 5 SOC-mas XX-what-ee
            • Day 6 If I can't find a nice malware to use, I'm not going
            • Day 7 Oh, no. I'M SPEAKING IN CLOUDTRAIL!
            • Blue
            • Light
            • Command Line
            • Cryptography
            • Networking
            • Networking Fundamentals
            • Windows and AD Fundamentals
            • CyberSecurity 101
            • Active Directory Basics
            • Cryptography Basics
            • Defensive Security Intro
            • Intro to LAN
            • Linux Shells
            • Metasploit Introduction
            • Networking Concepts
            • Offensive Security Intro
            • Public Key Cryptography Basics
            • Search Skills
            • Summary - Active Directory Basics
            • What is Networking
            • Windows Command Line
            • Windows Fundamentals 1
            • Windows Fundamentals 2
            • Windows Fundamentals 3
            • Windows PowerShell
          • 🐧 TryHackMe
          • TryHackMe TODO List
          • 100+ Docker Concepts you Need to Know
          • before you code, learn how computers work
          • Docker in 100 Seconds
          • Kerberos Authentication
          • Kubernetes 101
          • Youtube Learnings
      • About Me
      • Blog Posts 📚

    📝 Latest Posts

    • 100+ Docker Concepts you Need to Know

      Feb 13, 2025

      • Docker
      • DevOps
      • Blog
    • Kubernetes 101

      Feb 13, 2025

      • DevOps
      • Blog
    Home

    ❯

    自学

    ❯

    PicoCTF

    ❯

    🔗 PicoGym

    🔗 PicoGym

    Feb 13, 20251 min read

    Easy

    1. Super SSH
    2. Commitment Issues
    3. Blame Game
    4. First Find
    5. Verify
    6. runme.py
    7. Collaborative Development
    8. Binhexa
    9. Time Machine
    10. Big Zip
    11. endianness
    12. WebDecode
    13. Unminify
    14. Secret of the Polyglot
    15. interencdec
    16. Scan Surprise
    17. Inspect HTML
    18. Bookmarklet
    19. CanYouSee
    20. Local Authority
    21. Cookies
    22. Includes
    23. Inspector
    24. Where are the robots
    25. Scavenger Hunt
    26. Information
    27. Glory of the garden
    28. dont-you-love-banners
    29. SansAlpha

    Graph View

    Backlinks

    • No backlinks found

    NeoSpace©2024 🐉